Vulnerability Description
Multiple buffer overflows in Microsoft Visual Basic Enterprise Edition 6.0 SP6 allow user-assisted remote attackers to execute arbitrary code via a .dsr file with a long (1) ConnectionName or (2) CommandName line.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Visual Basic | 6.0 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/28563
- http://www.securityfocus.com/bid/27349Exploit
- http://www.securitytracker.com/id?1019258
- http://www.vupen.com/english/advisories/2008/0195
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39773
- https://www.exploit-db.com/exploits/4938
- http://secunia.com/advisories/28563
- http://www.securityfocus.com/bid/27349Exploit
- http://www.securitytracker.com/id?1019258
- http://www.vupen.com/english/advisories/2008/0195
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39773
- https://www.exploit-db.com/exploits/4938
FAQ
What is CVE-2008-0392?
CVE-2008-0392 is a vulnerability with a CVSS score of 9.3 (HIGH). Multiple buffer overflows in Microsoft Visual Basic Enterprise Edition 6.0 SP6 allow user-assisted remote attackers to execute arbitrary code via a .dsr file with a long (1) ConnectionName or (2) Comm...
How severe is CVE-2008-0392?
CVE-2008-0392 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0392?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Visual Basic.